article thumbnail

Fixing Data Breaches Part 1: Education

Troy Hunt

Let's get started with one I raised multiple times whilst sitting in front of Congress - education. Data Breaches Occur Due to Human Error. Nowhere is it truer than with data breaches and it's the most logical place to start this series. Education is the Best ROI on Security Spend. The difference is education.

article thumbnail

COPPA Guidance for EdTech Companies and Schools During the Coronavirus

Hunton Privacy

On April 9, 2020, the Federal Trade Commission (“FTC”) issued guidance under the Children’s Online Privacy Protection Act (“COPPA”) for operators of educational technology (“EdTech”) used both in school settings and for virtual learning.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News alert: NCA’s Data Privacy Week webinars highlight data protection for consumers, businesses

The Last Watchdog

22, 2024 – Today, the National Cybersecurity Alliance (NCA) , announced the program for its third annual Data Privacy Week campaign, which will take place from January 22nd to January 27th. This even includes information about a person’s physical well-being, like health data from apps.

article thumbnail

FTC Takes Action Against Chegg for Alleged Security Failures that Exposed Data of Employees and 40 Million Consumers

Hunton Privacy

On October 31, 2022, the Federal Trade Commission announced a proposed settlement with education technology provider Chegg in connection with the company’s alleged poor cybersecurity practices. .

article thumbnail

Businesses to Assist NHS Test and Trace Efforts

Hunton Privacy

Establishments and companies in the UK will therefore be responsible for the additional collection and potential sharing of customers’ personal data. Any entity engaging in this kind of data collection will need to comply with the requirements of data protection law.

article thumbnail

When are schools required to report personal data breaches?

IT Governance

Deliberate or accidental action (or inaction) by the school or one of the processors : an example would be sending old PCs, laptops or filing cabinets to be destroyed without first removing the data held on them. Sending personal data to the wrong person : this includes any message sent by email, post or fax. Identity theft or fraud.

article thumbnail

CIRWA Project tracks ransomware attacks on critical infrastructure

Security Affairs

According to the summary findings related to the period 2013-2020, the most targeted critical infrastructures are government facilities, followed by education and healthcare. Data collected by the researchers are very interesting and very useful for future research projects on the security of the critical infrastructure.